Trickbot malware has been with us since 2016. It started as a banking trojan, targeting financial services and users to steal banking data. However, over the years, it has evolved into sophisticated, multi-modular malware that is able to infect PCs running both Windows and Linux OS.
Trickbot malware is believed to be affiliated with Conti ransomware attacks as the ransomware was installed after networks were compromised by Trickbot. Other Trickbot gang’s malware, such as BazarLoader, used to deploy a Ryuk ransomware that targeted Volue , K12, The University of Vermont Health Network, and many others. Trickbot malwares usually spread through phishing campaigns, with embedded URLs or infected attachments.
Trickbot roots are being traced to Russian-based threat actors. One of the believed gang members was arrested recently in South Korea. In addition, a Latvian national was charged by the U.S Department of Justice for helping the Trickbot gang develop a platform for a new ransomware operation. Despite the arrests, the gang continued to operate as normal.
- Victim opens a malicious .docm file that is “protected” and macro should be enabled to “unlock it”:
Figure 1 Malicous .docm Attachment
- Once the victim enables macro execution, a randomly named .bat file is dropped into C:\ProgramData directory:
Figure 2 .bat File Drop
- Trickbot payload dropped from attacker’s server, using PowerShell to C:\ProgramData as .dll file.
- WinWord executes malicious DLL using rundll32.exe, known as T1218.011 MITRE technique.
- Malicious DLL being injected into svchost.exe, known as T1055.012 MITRE technique.
Figure 3 Execution Flow
The Trickbot gang is continuously evolving its arsenal by developing new tools and upgrading their existing ones. Our Macro Protection technology prevents the drop and the execution of malware belonging to the Trickbot Family at its earliest stage, including the execution of the aforementioned campaign:
Figure 4 Trickbot Execution Prevention
To learn more about how we can protect your business click below: